What's New in the Solaris 9 4/04 Operating Environment

Solaris Secure Shell

Secure Shell allows a user to securely access a remote host over an unsecured network. Data transfers and interactive user network sessions are protected from eavesdropping, session hijacking, and intermediary attacks. Solaris 9 Secure Shell supports SSHv1 and SSHv2 protocol versions. Strong authentication that uses public-key cryptography is provided. The X Window System and other network services can be tunneled safely over Secure Shell connections for additional protection.

The Secure Shell server, sshd, supports the monitoring and filtering of incoming requests for network services. The server can be configured to log the client host name of incoming requests and thus enhance network security. sshd uses the same mechanism that is used by the Tcp-wrappers 7.6 utility that is described in Freeware Enhancements.

For further information, see the sshd(1M), hosts_access(4), and hosts_options(4) man pages. See also “Using Solaris Secure Shell (Tasks)” in System Administration Guide: Security Services.